Regulation of Personal Information Sally Brierley & Emma Harvey.

Slides:



Advertisements
Similar presentations
Institutional Telecomms and Computer Network Monitoring Andrew Charlesworth University of Bristol 10 June 2002.
Advertisements

The Data Protection (Jersey) Law 2005.
Data Protection.
Christian Vargas. Also known as Data Privacy or Data Protection Is the relationship between collection and spreading or exposing data and information.
What does the Data Protection Act do? It sets standards which must be satisfied when obtaining, recording, holding, using, disclosing or disposing of.
1 Pertemuan 7 Points of Exposure Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
1 The Engineer as a Professional Privacy. 2 After reading the articles please answer the following questions. 1) Is privacy a concern that engineers have.
INTERNET and CODE OF CONDUCT
Data Protection: The Law. EU & Irish Legislation Data Protection Directive 95/46/EC Electronic Privacy Directive 2002/58/EC EUROPOL etc Data Protection.
Taking Steps to Protect Privacy A presentation to Hamilton-area Physiotherapy Managers by Bob Spence Communications Co-ordinator Office of the Ontario.
Individual User Logins
Audiences NI Data Protection Workshop
Data Protection Overview
 The Data Protection Act 1998 is an Act of Parliament which defines UK law on the processing of data on identifiable living people and it is the main.
Data Protection for Church of Scotland Congregations
CENTRAL SCOTLAND POLICE Data Protection & Information Security Stuart Macfarlane Information Governance Unit Police Service of Scotland.
Regulation of Personal Information Daniel Pettitt, Leon Sewell and Matthew Pallot.
PRIVACY. In pairs Work out a definition of the word PRIVACY that you think makes sense You’ve got about 7 minutes...
Ethics & Computer Technology. Ethics are…  A set of principles of right conduct.  A theory or a system of moral values.  The rules or standards.
Electronic Use Policies.   Social Media  Internet.
Elma Graham. To understand what data protection is To reflect on how data protection affects you To consider how you would safeguard the data of others.
OCR Nationals Level 3 Unit 3.  To understand how the Data Protection Act 1998 relates to the data you will be collecting, storing and processing  To.
Data Protection: An enabler? David Freeland, Senior Policy Officer 23 October 2014.
Data Protection Act 171 Computers and privacy There are problems as more computers are used There are problems as more computers are used More and more.
Data Protection STFC Presentation to PPD Senior Staff 26/11/2009 FoI/DP team.
DATA PROTECTION & FREEDOM OF INFORMATION. What is the difference between Data Protection & Freedom of Information? The Data Protection Act allows you.
Data Protection Act & Freedom of Information Simon Mansell Corporate Governance and Information Team.
Data Protection Corporate training Data Protection Act 1998 Replaces DPA 1994 EC directive 94/46/EC The Information Commissioner The courts.
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
Information Security Training for People who Supervise Computer Users.
IT Applications Theory Slideshows By Mark Kelly Vceit.com Privacy Laws.
Data Protection for Church of Scotland Congregations.
IM NETWORK MEETING 20 TH JULY, 2010 CONSULTATION WITH 3 RD PARTIES.
12/12/2015 Data Protection Act /12/2015 The DP Act A law that protects personal privacy and upholds individual’s rights Anyone who handles personal.
ANONYMISATION Research Data Management. c Research Data Management Sensitive Data Sensitive Data is information covering: The racial or ethnic origin.
How these affect the use of computers. There are 4 main types of legislation that affect the use of computers. 1.Data Protection Act 2.Copyright 3.Computer.
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
DATA PROTECTION ACT INTRODUCTION The Data Protection Act 1998 came into force on the 1 st March It is more far reaching than its predecessor,
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
Session 11 Data protection. 1 Contents Part 1: Introduction Part 2: Applicability and responsibility Part 3: Our procedures on data protection Part 4:
Data protection—training materials [Name and details of speaker]
Sharing Information Legally Lindsay Ould London Borough of Lewisham.
[ Direct marketing – an introduction to data protection and privacy] For [insert name of organisation] presented by [insert name of presenter] on [date]
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
Presented by Ms. Teki Akuetteh LLM (IT and Telecom Law) 16/07/2013Data Protection Act, 2012: A call for Action1.
Clark Holt Limited (Co. No ), Hardwick House, Prospect Place, Swindon, SN1 3LJ Authorised and regulated by the Solicitors Regulation.
ICT, Communication & related Legislations. Produced by Neil Liggett. Acts of Law – shared data & information.
Introduction to Data Protection Plan »Brief Introduction to Data Protection  Example  Principles  P3, 4, 7  Sensitive Data  Conditions for Processing.
Data protection act. During the second half of the 20th century, businesses, organisations and the government began using computers to store information.
Students’ Unions 2011 Data Protection and Students’ Unions Mairead O’Reilly 19 July 2011.
Data Protection GCSE ICT Mrs N Steventon-2005.
Data Protection: The Law
Data Protection and Confidentiality
Rights and Responsibilities
Data Protection Act.
IT Applications Theory Slideshows
Data Protection The Current Regime
General Data Protection Regulations Preparing for the upcoming changes in data protection law David Jones & Angharad Williams.
GDPR Overview Gydeline – October 2017
GDPR Overview Gydeline – October 2017
Data Protection & Freedom of Information- An Introduction
GENERAL DATA PROTECTION REGULATION (GDPR)
New Data Protection Legislation
The new data protection rules
Employee Privacy and Privacy of Employee Information
Data Protection principles
Data Protection What’s new about The General Data Protection Regulation (GDPR) May 2018? Call Kerry on Or .
General Data Protection Regulation Q & A Session
Presentation transcript:

Regulation of Personal Information Sally Brierley & Emma Harvey

Definition of Personal Personal Information Information relating to living individuals who can be identified from the information. Examples: Names Addresses Opinions… Sensitive Personal Information Examples: Racial or Ethnic origin Political or Religious beliefs Trade Union Membership Physical or mental health Sexual life Commission or alleged commission of an offence (and proceedings relating to such commission).

Data Protection Act “United Kingdom Act of Parliament which defines UK law on the processing of data on identifiable living people”. “In practice it provides a way for individuals to control information about themselves” Not applicable to domestic use (i.e. Keeping a personal phonebook)

Freedom of Information Act 2000 The Freedom of Information Act gives an individual the right to obtain information held by public authorities unless there are good reasons to keep it confidential.

Privacy and Electronic Communications (EC Directive) Regulations 2003 The Privacy and Electronic Communications (EC Directive) Regulations 2003 is a law in the United Kingdom which made it unlawful to, amongst other things, transmit an automated recorded message for direct marketing purposes via a telephone, without prior consent of the subscriber.United Kingdom This is somewhat similar to the US Do not call registry. However, it includes all electronic communications such as or SMS mobile phone messages.Do not call

BT End Users when working as part of BT Retail, staff members end up speaking to end users about their telephone lines – there is specific criteria required when speaking to someone about their line to ensure that they are who they say they are and that you’re allowed to discuss this information with them. Commonly there is a security procedure where specific questions will be asked; such as account names and security questions which have individual answers. When working as part of Openreach (field) it is important that engineers be wary of differentiating end users to specific customers – meaning they do not share any information about other phone lines in the area etc.

BT Service Providers (Our customers) When working as part of Openreach it is important to realise that there are different customers calling in who cannot be given another customers information – similar to the Retail LoB there are specific security questions that can be asked…

BT Customers (Service Providers) When working as part of Openreach our customers are Service Providers. We need to ensure that our customers privacy is kept secure and that we aren’t giving away personally identifiable information about our customers to people without permission to access this information. We also have a responsibility as a reputable company to ensure that we keep third party information secure – for example if a neighbour owns a lot of land with BT equipment on it and refuses access to BT to work on that equipment we can’t release the information to our customers about who refused us access.

BT and Data Protection Employees Personal Information – home address / contact information etc. Confidential Information – illness / reason for absence … confidential conversations about performance etc.

Privacy All providers have a privacy policy. Yahoo!, for example, scans s and IMs to advertise “personally relevant experiences”. All other large providers do the same thing. If they can scan your s to identify spam and target you for adverts, can they use this information in other ways? Yahoo! states in it’s security policy that it takes reasonable steps to protect your information. Is this enough?

Internet Privacy Search engines can record your searches Google, for example, records all search history and if you have entered personal information this can be traced. They use this information to customise and personalise search results. You can opt out of this. Should it be an opt in service? Should service providers be allowed to trace your search history? If your computer is hacked, can access to this history be compromised?

Privacy and Surveillance The Regulation of Investigatory Powers Act 2000 (RIPA) is the legislation that governs surveillance of your communications, s, phone calls. It was introduced to take into account the growth of the internet and stronger encryption.

Targeted Advertising Should companies be allowed to use your personal information to target advertising to you? In relation to the internet, this can be classed as unsolicited advertising, as the user did not request to be targeted. – Google AdWords – Yahoo! Search Marketing – Microsoft adCenter

iPhone Location Information In April 2011 it was revealed that the Apple iPhone saves details of locations into a file on the phone. The file contains the latitude and longitude of the phone's recorded coordinates along with a timestamp, meaning that anyone who stole the phone or the computer could discover details about the owner's movements using a simple program. It was found that Apple had no use for this information and there was no reason for it being stored. The latest news is that Microsoft is being sued for tracking the location of it’s users, even after customers have turned the software off. “Explicit permission” Normal phones record location information but this is only available to the police under the Regulation of Investigatory Power Act.

Sources ?src=related_normal&rel=